Security implications of cooperative communications in wireless networks

Salik Makda, Ankur Choudhary, Naveen Ramant, Thanasis Korakis, Zhifeng Tao, Shivendra Panwar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Cooperative communications is an innovative technique that is expected to change the behavior of wireless networks in the near feature. In the MAC layer, this technique defines new protocols by enabling additional collaboration from stations that otherwise will not directly participate in the transmission. A typical example of such a protocol is CoopMAC [1], a cooperative MAC protocol that involves an intermediate station or helper in the communication between a transmitter and a receiver. Under this scheme, the transmitter sends its packets to the receiver by forwarding them through the helper. In this way the protocol takes advantage of spatial diversity and faster two-hop transmission, significantly improving the performance of the network. In such an environment, where the sender relies on an intermediate helper to forward its packets to the original destination, numerous security issues may arise. The present security schemes need to be adapted in order to support end-to-end security in the source-helper-destination communication model. In this paper we discuss the potential security issues that cooperation may raise and propose two new security schemes to address those concerns. To evaluate the feasibility of the proposed algorithms, we implement them using open source drivers platform, which is explained in the paper in detail. Moreover, the paper also discusses the design challenges encounterd and share the experience and insights gained during implementation. Our implementations of the suggested techniques allow the WEP, WPA and WPA2 (802.11i) security protocols to successfully operate in the new cooperative environment.

Original languageEnglish (US)
Title of host publicationProceedings of the 2008 IEEE Sarnoff Symposium, SARNOFF
DOIs
StatePublished - 2008
Event2008 IEEE Sarnoff Symposium, SARNOFF - Princeton, NJ, United States
Duration: Apr 28 2008Apr 30 2008

Other

Other2008 IEEE Sarnoff Symposium, SARNOFF
CountryUnited States
CityPrinceton, NJ
Period4/28/084/30/08

Fingerprint

Cooperative communication
Wireless networks
Network protocols
Transmitters
Communication

Keywords

  • Cooperative communications
  • Cooperative MAC protocols
  • Open source implementation
  • Wireless security

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Cite this

Makda, S., Choudhary, A., Ramant, N., Korakis, T., Tao, Z., & Panwar, S. (2008). Security implications of cooperative communications in wireless networks. In Proceedings of the 2008 IEEE Sarnoff Symposium, SARNOFF [4520069] https://doi.org/10.1109/SARNOF.2008.4520069

Security implications of cooperative communications in wireless networks. / Makda, Salik; Choudhary, Ankur; Ramant, Naveen; Korakis, Thanasis; Tao, Zhifeng; Panwar, Shivendra.

Proceedings of the 2008 IEEE Sarnoff Symposium, SARNOFF. 2008. 4520069.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Makda, S, Choudhary, A, Ramant, N, Korakis, T, Tao, Z & Panwar, S 2008, Security implications of cooperative communications in wireless networks. in Proceedings of the 2008 IEEE Sarnoff Symposium, SARNOFF., 4520069, 2008 IEEE Sarnoff Symposium, SARNOFF, Princeton, NJ, United States, 4/28/08. https://doi.org/10.1109/SARNOF.2008.4520069
Makda S, Choudhary A, Ramant N, Korakis T, Tao Z, Panwar S. Security implications of cooperative communications in wireless networks. In Proceedings of the 2008 IEEE Sarnoff Symposium, SARNOFF. 2008. 4520069 https://doi.org/10.1109/SARNOF.2008.4520069
Makda, Salik ; Choudhary, Ankur ; Ramant, Naveen ; Korakis, Thanasis ; Tao, Zhifeng ; Panwar, Shivendra. / Security implications of cooperative communications in wireless networks. Proceedings of the 2008 IEEE Sarnoff Symposium, SARNOFF. 2008.
@inproceedings{bd23a42ca9a24da59e4453fe2f34f942,
title = "Security implications of cooperative communications in wireless networks",
abstract = "Cooperative communications is an innovative technique that is expected to change the behavior of wireless networks in the near feature. In the MAC layer, this technique defines new protocols by enabling additional collaboration from stations that otherwise will not directly participate in the transmission. A typical example of such a protocol is CoopMAC [1], a cooperative MAC protocol that involves an intermediate station or helper in the communication between a transmitter and a receiver. Under this scheme, the transmitter sends its packets to the receiver by forwarding them through the helper. In this way the protocol takes advantage of spatial diversity and faster two-hop transmission, significantly improving the performance of the network. In such an environment, where the sender relies on an intermediate helper to forward its packets to the original destination, numerous security issues may arise. The present security schemes need to be adapted in order to support end-to-end security in the source-helper-destination communication model. In this paper we discuss the potential security issues that cooperation may raise and propose two new security schemes to address those concerns. To evaluate the feasibility of the proposed algorithms, we implement them using open source drivers platform, which is explained in the paper in detail. Moreover, the paper also discusses the design challenges encounterd and share the experience and insights gained during implementation. Our implementations of the suggested techniques allow the WEP, WPA and WPA2 (802.11i) security protocols to successfully operate in the new cooperative environment.",
keywords = "Cooperative communications, Cooperative MAC protocols, Open source implementation, Wireless security",
author = "Salik Makda and Ankur Choudhary and Naveen Ramant and Thanasis Korakis and Zhifeng Tao and Shivendra Panwar",
year = "2008",
doi = "10.1109/SARNOF.2008.4520069",
language = "English (US)",
isbn = "1424418437",
booktitle = "Proceedings of the 2008 IEEE Sarnoff Symposium, SARNOFF",

}

TY - GEN

T1 - Security implications of cooperative communications in wireless networks

AU - Makda, Salik

AU - Choudhary, Ankur

AU - Ramant, Naveen

AU - Korakis, Thanasis

AU - Tao, Zhifeng

AU - Panwar, Shivendra

PY - 2008

Y1 - 2008

N2 - Cooperative communications is an innovative technique that is expected to change the behavior of wireless networks in the near feature. In the MAC layer, this technique defines new protocols by enabling additional collaboration from stations that otherwise will not directly participate in the transmission. A typical example of such a protocol is CoopMAC [1], a cooperative MAC protocol that involves an intermediate station or helper in the communication between a transmitter and a receiver. Under this scheme, the transmitter sends its packets to the receiver by forwarding them through the helper. In this way the protocol takes advantage of spatial diversity and faster two-hop transmission, significantly improving the performance of the network. In such an environment, where the sender relies on an intermediate helper to forward its packets to the original destination, numerous security issues may arise. The present security schemes need to be adapted in order to support end-to-end security in the source-helper-destination communication model. In this paper we discuss the potential security issues that cooperation may raise and propose two new security schemes to address those concerns. To evaluate the feasibility of the proposed algorithms, we implement them using open source drivers platform, which is explained in the paper in detail. Moreover, the paper also discusses the design challenges encounterd and share the experience and insights gained during implementation. Our implementations of the suggested techniques allow the WEP, WPA and WPA2 (802.11i) security protocols to successfully operate in the new cooperative environment.

AB - Cooperative communications is an innovative technique that is expected to change the behavior of wireless networks in the near feature. In the MAC layer, this technique defines new protocols by enabling additional collaboration from stations that otherwise will not directly participate in the transmission. A typical example of such a protocol is CoopMAC [1], a cooperative MAC protocol that involves an intermediate station or helper in the communication between a transmitter and a receiver. Under this scheme, the transmitter sends its packets to the receiver by forwarding them through the helper. In this way the protocol takes advantage of spatial diversity and faster two-hop transmission, significantly improving the performance of the network. In such an environment, where the sender relies on an intermediate helper to forward its packets to the original destination, numerous security issues may arise. The present security schemes need to be adapted in order to support end-to-end security in the source-helper-destination communication model. In this paper we discuss the potential security issues that cooperation may raise and propose two new security schemes to address those concerns. To evaluate the feasibility of the proposed algorithms, we implement them using open source drivers platform, which is explained in the paper in detail. Moreover, the paper also discusses the design challenges encounterd and share the experience and insights gained during implementation. Our implementations of the suggested techniques allow the WEP, WPA and WPA2 (802.11i) security protocols to successfully operate in the new cooperative environment.

KW - Cooperative communications

KW - Cooperative MAC protocols

KW - Open source implementation

KW - Wireless security

UR - http://www.scopus.com/inward/record.url?scp=49049091624&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=49049091624&partnerID=8YFLogxK

U2 - 10.1109/SARNOF.2008.4520069

DO - 10.1109/SARNOF.2008.4520069

M3 - Conference contribution

AN - SCOPUS:49049091624

SN - 1424418437

SN - 9781424418435

BT - Proceedings of the 2008 IEEE Sarnoff Symposium, SARNOFF

ER -